Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/86604?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "type": "mozilla", "namespace": "", "name": "Thunderbird ESR", "version": "10.0.6", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "10.0.7", "latest_non_vulnerable_version": "17.0.11", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55392?format=api", "vulnerability_id": "VCID-5ck6-ca4e-yqdc", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1967.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1967.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1967", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87372", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87387", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87424", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.8742", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.8743", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87432", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1967" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840259", "reference_id": "840259", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840259" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967", "reference_id": "CVE-2012-1967", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-56", "reference_id": "mfsa2012-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1967" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ck6-ca4e-yqdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55270?format=api", "vulnerability_id": "VCID-63n5-1xtt-9fgb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1951.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1951.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1951", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87409", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.8743", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1951" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205", "reference_id": "840205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951", "reference_id": "CVE-2012-1951", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44", "reference_id": "mfsa2012-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1951" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63n5-1xtt-9fgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55320?format=api", "vulnerability_id": "VCID-7a5f-gu1y-ckhk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1959.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1959.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1959", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76121", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76032", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.7608", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76094", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76119", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76096", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76138", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1959" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840212", "reference_id": "840212", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959", "reference_id": "CVE-2012-1959", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-49", "reference_id": "mfsa2012-49", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-49" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1959" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7a5f-gu1y-ckhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55255?format=api", "vulnerability_id": "VCID-8cqv-narg-5kf1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1949.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1949.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1949", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.88038", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87968", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87997", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.88017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.88024", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.88034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.88026", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.88027", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.8804", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1949" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021281", "reference_id": "2021281", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949", "reference_id": "CVE-2012-1949", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-42", "reference_id": "mfsa2012-42", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-42" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1949" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cqv-narg-5kf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55361?format=api", "vulnerability_id": "VCID-8q4m-rkhj-5fhj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1964", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75625", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75627", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75658", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75637", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75672", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.7572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1964" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840222", "reference_id": "840222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964", "reference_id": "CVE-2012-1964", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-54", "reference_id": "mfsa2012-54", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1964" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8q4m-rkhj-5fhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55308?format=api", "vulnerability_id": "VCID-9qc6-vb2t-zuh8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1957.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1957.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1957", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76999", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76936", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76989", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76967", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.76963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.77004", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00998", "scoring_system": "epss", "scoring_elements": "0.77006", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1957" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840208", "reference_id": "840208", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957", "reference_id": "CVE-2012-1957", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-47", "reference_id": "mfsa2012-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1957" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9qc6-vb2t-zuh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55316?format=api", "vulnerability_id": "VCID-bnfy-q3yv-k7h1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1958.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1958.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1958", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88246", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88203", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.8824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88233", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03872", "scoring_system": "epss", "scoring_elements": "0.88247", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1958" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840211", "reference_id": "840211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958", "reference_id": "CVE-2012-1958", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-48", "reference_id": "mfsa2012-48", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-48" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1958" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bnfy-q3yv-k7h1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55330?format=api", "vulnerability_id": "VCID-n252-jv5g-77ab", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1961.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.7864", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.7867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78651", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78677", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.7869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01172", "scoring_system": "epss", "scoring_elements": "0.78709", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1961" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840214", "reference_id": "840214", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961", "reference_id": "CVE-2012-1961", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-51", "reference_id": "mfsa2012-51", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-51" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1961" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n252-jv5g-77ab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55345?format=api", "vulnerability_id": "VCID-tw4j-8pph-yqdn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1963.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1963.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1963", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.80974", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.80983", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81005", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.8104", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81074", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81075", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1963" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840220", "reference_id": "840220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963", "reference_id": "CVE-2012-1963", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-53", "reference_id": "mfsa2012-53", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-53" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1963" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tw4j-8pph-yqdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55294?format=api", "vulnerability_id": "VCID-u7w3-5raz-uyhf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1955.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1955.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1955", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85499", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85528", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85533", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85575", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02583", "scoring_system": "epss", "scoring_elements": "0.85599", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1955" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840206", "reference_id": "840206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955", "reference_id": "CVE-2012-1955", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-45", "reference_id": "mfsa2012-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-45" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1955" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u7w3-5raz-uyhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55336?format=api", "vulnerability_id": "VCID-vvwx-y7rj-73h7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1962.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1962.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1962", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87409", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03397", "scoring_system": "epss", "scoring_elements": "0.8743", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1962" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840215", "reference_id": "840215", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962", "reference_id": "CVE-2012-1962", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-52", "reference_id": "mfsa2012-52", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1088", "reference_id": "RHSA-2012:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1089", "reference_id": "RHSA-2012:1089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1089" }, { "reference_url": "https://usn.ubuntu.com/1509-1/", "reference_id": "USN-1509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1509-1/" }, { "reference_url": "https://usn.ubuntu.com/1510-1/", "reference_id": "USN-1510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86604?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" } ], "aliases": [ "CVE-2012-1962" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvwx-y7rj-73h7" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6" }